{"id":253,"date":"2019-05-08T10:05:36","date_gmt":"2019-05-08T10:05:36","guid":{"rendered":"https:\/\/anthro-security.net\/?p=253"},"modified":"2019-09-20T09:48:28","modified_gmt":"2019-09-20T09:48:28","slug":"sneak-preview-secrecy-and-methods-in-security-research-a-qualitative-guide-to-fieldwork","status":"publish","type":"post","link":"https:\/\/anthro-security.net\/?p=253","title":{"rendered":"Out now: Secrecy and Methods in Security Research: A Guide to Qualitative Fieldwork"},"content":{"rendered":"\n<p>edited by Marieke <strong>De Goede<\/strong>, Esm\u00e9 <strong>Bosma <\/strong>and Polly <strong>Pallister-Wilkins<\/strong>, London; New York: Routledge, 2019. <br>        <\/p>\n\n\n\n<p>including chapters by ASN members Erella Grassiani and Alexandra       Schwell!    <\/p>\n\n\n\n<p>For more information please visit the books page on <a href=\"https:\/\/www.crcpress.com\/Secrecy-and-Methods-in-Security-Research-A-Guide-to-Qualitative-Fieldwork\/Goede-Bosma-Pallister-Wilkins\/p\/book\/9780367027247\">CRC Press<\/a>.<\/p>\n\n\n\n<div style=\"height:41px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" width=\"432\" height=\"648\" src=\"https:\/\/anthro-security.net\/wp-content\/uploads\/2019\/05\/9780367027247.jpg\" alt=\"\" class=\"wp-image-254\" srcset=\"https:\/\/anthro-security.net\/wp-content\/uploads\/2019\/05\/9780367027247.jpg 432w, https:\/\/anthro-security.net\/wp-content\/uploads\/2019\/05\/9780367027247-200x300.jpg 200w\" sizes=\"(max-width: 432px) 100vw, 432px\" \/><\/figure><\/div>\n\n\n\n<h3>Summary<\/h3>\n\n\n\n<p>This book analyses the challenges of \nsecrecy in security research, and develops a set of methods to navigate,\n encircle and work with secrecy.<\/p>\n\n\n\n<!--more-->\n\n\n\n<p>How can researchers navigate secrecy in their fieldwork, when they \nencounter confidential material, closed-off quarters or bureaucratic \nrebuffs? This is a particular challenge for researchers in the security \nfield, which is by nature secretive and difficult to access. This book \ncreatively assesses and analyses the ways in which secrecies operate in \nsecurity research. The collection sets out new understandings of \nsecrecy, and shows how secrecy itself can be made productive to research\n analysis. It offers students, PhD researchers and senior scholars a \nrich toolkit of methods and best-practice examples for ethically \nappropriate ways of navigating secrecy. It pays attention to the balance\n between confidentiality, and academic freedom and integrity. The \nchapters draw on the rich qualitative fieldwork experiences of the \ncontributors, who did research at a diversity of sites, for example at a\n former atomic weapons research facility, inside deportation units, in \nconflict zones, in everyday security landscapes, in virtual spaces, and \nat borders, bureaucracies and banks.<\/p>\n\n\n\n<p>The book will be of interest to students of research methods, critical security studies and International Relations in general.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>edited by Marieke De Goede, Esm\u00e9 Bosma and Polly Pallister-Wilkins, London; New York: Routledge, 2019. including chapters by ASN members Erella Grassiani and Alexandra Schwell! For more information please visit the books page on CRC Press. Summary This book analyses the challenges of secrecy in security research, and develops a set of methods to navigate, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/anthro-security.net\/index.php?rest_route=\/wp\/v2\/posts\/253"}],"collection":[{"href":"https:\/\/anthro-security.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/anthro-security.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/anthro-security.net\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/anthro-security.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=253"}],"version-history":[{"count":6,"href":"https:\/\/anthro-security.net\/index.php?rest_route=\/wp\/v2\/posts\/253\/revisions"}],"predecessor-version":[{"id":275,"href":"https:\/\/anthro-security.net\/index.php?rest_route=\/wp\/v2\/posts\/253\/revisions\/275"}],"wp:attachment":[{"href":"https:\/\/anthro-security.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=253"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/anthro-security.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=253"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/anthro-security.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=253"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}